Fwd: MacGPG2 v2.0.11 released!

Benjamin Donnachie benjamin at py-soft.co.uk
Sat Apr 4 15:49:17 CEST 2009


---------- Forwarded message ----------
From: Benjamin Donnachie <benjamin at py-soft.co.uk>
Date: 2009/3/29
Subject: MacGPG2 v2.0.11 released!
To: macgpg2-users at lists.sourceforge.net


MacGPG2 v2.0.11 is now available from
http://sourceforge.net/project/showfiles.php?group_id=248469&package_id=303406&release_id=671824

Please use the accompanying signature to verify your download before extracting.

A very rare bug has been reported whereby the pinentry package is not
properly installed.  If this occurs on your system please notify me
and then download the separate pinentry package from
https://sourceforge.net/project/showfiles.php?group_id=248469&package_id=304467

Report any problems to the macgpg2 team - http://macgpg2.sourceforge.net/



Changes to MacGPG2 since previous release:

* Universal binary ie single download for Intel and PPC Macs.

* Fully internationalised and will now messages correctly if LANG
environment variable is set.

* start-gpg-agent helper script now installed for all users

* Executables now include MacGPG2 in banner to assist debugging.

* Core upgraded to GnuPG v2.0.11 and gcrypt 1.4.4


Noteworthy changes in version GnuPG 2.0.11 (2009-03-03)
-------------------------------------------------------

 * Fixed a problem in SCDAEMON which caused unexpected card resets.

 * SCDAEMON is now aware of the Geldkarte.

 * The SCDAEMON option --allow-admin is now used by default.

 * GPGCONF now restarts SCdaemon if necessary.

 * The default cipher algorithm in GPGSM is now again 3DES.  This is
due to interoperability problems with Outlook 2003 which still can't
cope with AES.

Noteworthy changes in version Libgcrypt 1.4.4 (2009-01-22)
----------------------------------------------------------

 * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
This functionality has been in Libgcrypt since 1.3.0.

 * MD5 may now be used in non-enforced fips mode.

 * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.

 * In fips mode, RSA keys are now generated using the X9.31 algorithm
and DSA keys using the FIPS 186-2 algorithm.

 * The transient-key flag is now also supported for DSA key
  generation.  DSA domain parameters may be given as well.



More information about the Gnupg-users mailing list